Up to this point we have examined procedures and techniques for deploying security to different areas of a network. However, security across a network is only as strong as its weakest point. To deploy security consistently across an organization's network, you must create a comprehensive security plan for each project that requires protection. The security plan serves as a guide for configuring the network to meet an organization's security policy.
To complete this chapter, you must read the chapter scenario. This scenario is used throughout the chapter to apply the design decisions discussed in each lesson.